Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 3 de 3
Filter
Add filters

Database
Language
Document Type
Year range
1.
10th International Conference on Innovation, Modern Applied Science and Environmental Studies, ICIES 2022 ; 351, 2022.
Article in English | Scopus | ID: covidwho-2186227

ABSTRACT

The Internet of Things (IoT) became, and still an important and critical element during the covid-19 pandemic, and this paper was written within that framework, as it proposes a synchronized medical IoT platform that is used to monitor citizens' access to public areas, and where the access is only authorized if one of the three following conditions is fulfilled: Be vaccinated (which is verified via a QR code), having a negative PCR test (valid for only 48 hours), undergoing a body temperature measurement. Of course, a confirmation of identity with a facial recognition test is mandatory. This automatic process will allow us to reduce the possibility of spreading the disease due to the congestion of the checkpoints, as well as to detect citizens who could be potential patients of the covid-19 virus. © The Authors.

2.
Internet of Things ; : 323-338, 2022.
Article in English | Scopus | ID: covidwho-1797728

ABSTRACT

Our work revolves around creating and developing a medical platform that acts on the citizen’s right to access a public space by differentiating between vaccinated and those who have done the PCR test to avoid the fast spread of the covid-19 virus. In this scope, three algorithms were applied to complete this platform: the first one serves to verify the citizens who are vaccinated, the second allows to see and check the validity of the PCR test for people who are not vaccinated, and, finally, the third algorithm serves to check the temperature and the identity of citizens. This last algorithm is applied when the citizen is not vaccinated or does not have the PCR test. For this project, we used four IoT nodes to run our platform in real time: a Passive infrared (PIR) client node, a temperature sensor, a RFID tag, and a camera client node. We also used artificial intelligence for facial recognition, which will allow us to verify the citizen’s identity. We applied the Constrained Application Protocol to ensure a fluid communication between the platform’s nodes, the integrity, and the confidentiality of the data shared. We secured payloads with two encryption algorithms which are Advanced Encryption Standard (AES)-Secure Hash Algorithm (SHA) 256-bit and Rivest Shamir Adleman (RSA)-SHA256. The security of the database’s information is also an important aspect;thus, the use of the AT2 blockchain will allow us to strengthen the security of the database against any network attack. As for the network topology, we have opted for the cluster-tree topology, and that is after a study that showed us it is the best in terms of execution time, memory occupation, and energy consumption and even for the reliability of the communication. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.

3.
International Conference on Information, Communication and Cybersecurity, ICI2C 2021 ; 357 LNNS:414-424, 2022.
Article in English | Scopus | ID: covidwho-1680618

ABSTRACT

The product of this work is based on the creation of a medical IoT platform that serves to control citizens to access public or private space to prevent the spread of the covid-19 pandemic. Our platform discusses 3 scenarios in which a citizen can be allowed to: the first scenario is used to verify citizens who are vaccinated by their QR Code and facial authentication, the second scenario is used to verify citizens who have done a PCR test (which is only valid for 48 h) and the facial recognition test as well, and finally we have the third scenario which starts by measuring the body temperature and then verifying the identity by presenting an RFID number and passing the facial recognition test. This platform is implemented on 4 types of network topologies (Star, Tree, Mesh, Cluster) to choose which one best matches our platform’s needs in terms of execution time, memory occupation, and energy consumption. Since this platform is secure and intelligent, we opted for using the CoAP communication protocols to ensure communication between the nodes. We used the AES/RSA-SHA256 encryption algorithm to ensure data security and protection from any attacks. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.

SELECTION OF CITATIONS
SEARCH DETAIL